IT PARK
    Most Popular

    How does the camera work?

    Mar 14, 2025

    What are the misconceptions in data governance in the digital age?

    Apr 03, 2025

    The role of IoT devices in intelligent workplace technology

    May 09, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      How do Bluetooth headsets achieve noise cancellation?

      May 09, 2025

      Wireless charging principle

      May 08, 2025

      How to solve the problem of computer blue screen? What about the blue screen of the computer?

      May 07, 2025

      How often should the router be turned off?

      May 06, 2025

      What is a port?

      May 05, 2025
    • AI

      AI reads brains and deciphers people's inner monologues! Will it read all my secrets?

      May 09, 2025

      When AI starts to have "subconsciousness"

      May 08, 2025

      Can AI Painting Replace Human Painters

      May 07, 2025

      Who owns the copyright of the paintings created by AI for you?

      May 06, 2025

      How does the meta universe "feed" artificial intelligence models?

      May 05, 2025
    • Big Data

      Benefits of big data analysis and how to analyze big data

      May 09, 2025

      Six benefits of big data for enterprises

      May 08, 2025

      Six big data mistakes that enterprises should avoid

      May 07, 2025

      Cloud-native Big Data, Lake-Warehouse Integration, AI for Data - Who's in charge in the future?

      May 06, 2025

      Why do 85% of Big Data projects end up in failure?

      May 05, 2025
    • CLO

      What are the advantages and disadvantages of hybrid cloud?

      May 09, 2025

      Cloud computing has many applications in our daily life, what are the main ones?

      May 08, 2025

      What are the characteristics of cloud computing?

      May 07, 2025

      How do I evaluate cloud providers? What are the cloud outage handling strategies?

      May 06, 2025

      Gartner's Latest Forecast: Global Cloud Revenue to Surpass Non-Cloud Revenue

      May 05, 2025
    • IoT

      The role of IoT devices in intelligent workplace technology

      May 09, 2025

      Protecting IT, OT, IOT and IoMT in Healthcare

      May 08, 2025

      How to protect the Internet of Things?

      May 07, 2025

      Is Predictive Maintenance the Ultimate Solution for the Internet of Things

      May 06, 2025

      Smart Museums: 6 IoT Applications for Museums and Galleries

      May 05, 2025
    • Blockchain

      Ten application scenarios for blockchain

      May 09, 2025

      What is a privacy coin? What is the difference between them and Bitcoin?

      May 08, 2025

      The difference between Bitcoin cash and Bitcoin

      May 07, 2025

      Killing more worthless projects will be a victory for cryptocurrency

      May 06, 2025

      What causes the bitcoin network hash rate to increase?

      May 05, 2025
    IT PARK
    Home » AI » Google has categorized 6 real-world AI attacks to prepare for immediately
    AI

    Google has categorized 6 real-world AI attacks to prepare for immediately

    There are 6 common attacks faced by modern AI systems: hinting attacks, training data extraction, backdoor manipulation of models, adversarial examples, manipulation of training data of models using data contamination attacks, and data leakage attacks.
    Updated: Apr 01, 2025
    Google has categorized 6 real-world AI attacks to prepare for immediately

    Google researchers have identified six specific attacks against real-world AI systems, finding that these common attack vectors exhibit a unique level of sophistication that they note will require a combination of adversarial simulations and the help of AI experts to build a solid defense.

    In a report released this week, the company revealed that its dedicated AI Red Team has identified a variety of threats to this rapidly evolving technology, based primarily on how attackers manipulate the Large Language Models (LLMs) that drive generative AI products like ChatGPT, Google Bard, and others.

    These attacks largely lead to technologies that produce unintended or even maliciously driven results, which can lead to consequences ranging from the mundane, such as photos of ordinary people appearing on celebrity photo sites, to the more serious, such as security-evading phishing attacks or data theft.

    Google's findings come hot on the heels of its release of the Secure Artificial Intelligence Framework (SAIF), which the company says is designed to address AI security before it's too late, as the technology has experienced rapid adoption, creating new security threats.

    6 Common Attacks Facing Modern AI Systems The first set of common attacks identified by Google are hint attacks, which involve "hint engineering." This is a term that refers to the production of effective hints that direct LLM to perform desired tasks. When this influence on the model is malicious, it can in turn maliciously influence the output of an LLM-based application in ways that are not intended, the researchers said.

    One example would be if someone added a paragraph to an AI-based phishing attack that was not visible to the end user, but could instruct the AI to classify the phishing email as legitimate. This could allow it to bypass email anti-phishing protections and increase the chances of a successful phishing attack.

    Another attack the team discovered is training data extraction, which targets the reconstruction of verbatim training examples used by LLM - such as content from the Internet.

    In this way, attackers can extract confidential information, such as verbatim personally identifiable information or passwords, from the data. "Attackers have an incentive to target personalized models or models trained on data containing personally identifiable data to collect sensitive information," the researchers wrote.

    A third potential AI attack is backdoor manipulation of models, where an attacker "may attempt to covertly alter the behavior of a model to produce outputs that are incorrectly characterized by specific 'trigger' words or features, also known as backdoors," the researchers wrote. In this type of attack, a threat actor can hide code in the model or its output to perform malicious activities.

    The fourth type of attack, called adversarial examples, is when an attacker provides an input to a model that results in a "deterministic, but highly unexpected output," the researchers wrote. In one example, the model could display an image that looks like one thing to the human eye, but the model recognizes it as something completely different. Such attacks can be fairly benign, and in one case, someone could train the model to recognize a photo of himself or herself as one deemed worthy of appearing on a celebrity website.

    An attacker could also use a data contamination attack to manipulate the model's training data to influence the model's output based on the attacker's preferences-which could also threaten the security of the software supply chain if developers are using AI to help them develop software. The impact of such an attack could be similar to backdoor manipulation of models, the researchers noted.

    The final type of attack identified by Google's specialized AI red team is a data leakage attack, in which an attacker can copy a model's file representation to steal sensitive intellectual property or other information. For example, if a model is used for speech recognition or text generation, an attacker might try to extract speech or text information from the model.

    google AI system attacks
    Previous Article What is the Coin Smart Chain (BSC)
    Next Article Do I need to know Python to learn Big Data?

    Related Articles

    AI

    Low-Quality AI-Generated Websites Are Growing Rapidly With Ad Support

    May 02, 2025
    AI

    It's time to explore the creation of "AI-free sanctuaries"

    Apr 16, 2025
    AI

    AGI Avengers! Google Brain and DeepMind officially announced a merger

    May 03, 2025
    Most Popular

    How does the camera work?

    Mar 14, 2025

    What are the misconceptions in data governance in the digital age?

    Apr 03, 2025

    The role of IoT devices in intelligent workplace technology

    May 09, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.